Uncache Script Security & Risk Analysis

wordpress.org/plugins/uncache-script

Force your scripts and style to uncache

300 active installs v1.2.0 PHP + WP 3.0.3+ Updated Aug 20, 2015
cachecachingpage-cachewp-cachewp-super-cache
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Uncache Script Safe to Use in 2026?

Generally Safe

Score 85/100

Uncache Script has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The 'uncache-script' plugin v1.2.0 presents a mixed security picture. On the positive side, the plugin has a remarkably small attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all SQL queries utilize prepared statements, and there are no recorded vulnerabilities or CVEs, indicating a history of stable and likely secure code. The presence of nonce and capability checks on its limited entry points is also a good security practice.

However, a significant concern arises from the code analysis revealing that 100% of its six identified output operations are not properly escaped. This is a critical weakness that could allow for Cross-Site Scripting (XSS) vulnerabilities if user-supplied data, or data that could be manipulated by an attacker, is reflected directly in the output. While the absence of complex taint flows and dangerous functions is reassuring, the lack of output escaping creates a direct and exploitable avenue for malicious code injection.

In conclusion, the plugin's strengths lie in its minimal attack surface and adherence to secure database practices. The primary weakness is the universal failure to escape output, which introduces a tangible XSS risk. Until this output escaping issue is addressed, the plugin should be considered to have a moderate security risk due to potential XSS exploits.

Key Concerns

  • Outputs not properly escaped
Vulnerabilities
None known

Uncache Script Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Uncache Script Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
3
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Attack Surface

Uncache Script Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_menutheme-options.php:5
actionadmin_inittheme-options.php:6
filterscript_loader_srcuncache-script.php:17
filterstyle_loader_srcuncache-script.php:18
actionadmin_bar_menuuncache-script.php:80
actionadmin_menuus-theme-options.php:5
actionadmin_initus-theme-options.php:6
actionadmin_enqueue_scriptsus-theme-options.php:7
Maintenance & Trust

Uncache Script Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedAug 20, 2015
PHP min version
Downloads7K

Community Trust

Rating0/100
Number of ratings0
Active installs300
Developer Profile

Uncache Script Developer Profile

todiadiyatmo

4 plugins · 7K total installs

70
trust score
Avg Security Score
87/100
Avg Patch Time
956 days
View full developer profile
Detection Fingerprints

How We Detect Uncache Script

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/uncache-script/assets/us-admin.css/wp-content/plugins/uncache-script/assets/uikit.js
Script Paths
/wp-content/plugins/uncache-script/assets/uikit.js
Version Parameters
scu_version

HTML / DOM Fingerprints

CSS Classes
us-option-wrapperus-theme-options-wrapwidefat-us
Data Attributes
id="updateUncache"
JS Globals
jQuery
FAQ

Frequently Asked Questions about Uncache Script